Metasploit mailing list archives
cmd/windows/reverse_perl not being executed.
From: Danux <danuxx () gmail com>
Date: Thu, 4 Mar 2010 15:06:07 -0600
Hi, I am using this payload cmd/windows/reverse_perl encoded (150 bytes) since I have only 268 bytes to place my shellcode. But I am not getting any reverse shell, I debugged the process and the shellcode is loaded in memory and decoded without problems. I also install perl in the Windows Vista 32-bit box but still no shell back. Is there any kind of requirement for this payload to succeed? -- Daniel Regalado aka Danux Hacker Wanna Be de Nezahualcoyotl www.macula-group.com _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- cmd/windows/reverse_perl not being executed. Danux (Mar 04)
- Re: cmd/windows/reverse_perl not being executed. Joshua J. Drake (Mar 05)
- Re: cmd/windows/reverse_perl not being executed. danuxx (Mar 05)
- Re: cmd/windows/reverse_perl not being executed. Joshua J. Drake (Mar 05)